共 50 条
- [1] On the security of two authenticated encryption schemes [J]. PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, VOLS 1 AND 2, 2008, : 1315 - 1319
- [2] Security Analysis of Two Authenticated Encryption Schemes [J]. 2008 INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS SYMPOSIA, PROCEEDINGS, 2008, : 158 - 163
- [3] On the Post-quantum Security of Classical Authenticated Encryption Schemes [J]. PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2023, 2023, 14064 : 79 - 104
- [4] On the Related-Key Attack Security of Authenticated Encryption Schemes [J]. SECURITY AND CRYPTOGRAPHY FOR NETWORKS (SCN 2022), 2022, 13409 : 362 - 386
- [6] Cryptanalysis and improvement of two convertible authenticated encryption schemes [J]. Dianzi Yu Xinxi Xuebao, 2006, 1 (151-153):
- [7] On the Security of Hwang-Lo-Hsiao-Chu Authenticated Encryption Schemes [J]. 4TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT 2013), THE 3RD INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2013), 2013, 19 : 565 - 569
- [8] Improved broadcast encryption schemes with enhanced security [J]. Journal of Ambient Intelligence and Humanized Computing, 2015, 6 : 121 - 129